Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000| #!/bin/bash | |
| while read LINE ; do | |
| N=$((N+1)) | |
| echo "$N - $LINE" | |
| python dnsrecon.py -d $LINE -t axfr -c axfr_results/$N-$LINE.csv | |
| done < alexa.txt |
| ##SOCKS Proxy## | |
| #Set up a SOCKS proxy on 127.0.0.1:1080 that lets you pivot through the remote host (10.0.0.1): | |
| #Command line: | |
| ssh -D 127.0.0.1:1080 10.0.0.1 | |
| #~/.ssh/config: | |
| Host 10.0.0.1 | |
| DynamicForward 127.0.0.1:1080 | |
| #You can then use tsocks or similar to use non-SOCKS-aware tools on hosts accessible from 10.0.0.1: |
| #!/usr/bin/env bash | |
| #purpose: perform low level steps and execute the karma.rc resource within metasploit. | |
| int=$1 | |
| function stop_airmon { | |
| nic=$1 | |
| airmon-ng stop $nic | |
| if [ $? -ne 0 ]; then echo "[+] could not stop airmon on $nic"; exit 1; else echo "[+] successfully stopped airmon for $nic"; fi | |
| } |
| <Html> | |
| <Head> | |
| <Title>Support Information</Title> | |
| <HTA:Application | |
| Caption = Yes | |
| Border = Thick | |
| ShowInTaskBar = Yes | |
| SingleInstance = Yes | |
| MaximizeButton = No |